• Title/Summary/Keyword: information expression

Search Result 3,009, Processing Time 0.03 seconds

Discriminant Metric Learning Approach for Face Verification

  • Chen, Ju-Chin;Wu, Pei-Hsun;Lien, Jenn-Jier James
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.742-762
    • /
    • 2015
  • In this study, we propose a distance metric learning approach called discriminant metric learning (DML) for face verification, which addresses a binary-class problem for classifying whether or not two input images are of the same subject. The critical issue for solving this problem is determining the method to be used for measuring the distance between two images. Among various methods, the large margin nearest neighbor (LMNN) method is a state-of-the-art algorithm. However, to compensate the LMNN's entangled data distribution due to high levels of appearance variations in unconstrained environments, DML's goal is to penalize violations of the negative pair distance relationship, i.e., the images with different labels, while being integrated with LMNN to model the distance relation between positive pairs, i.e., the images with the same label. The likelihoods of the input images, estimated using DML and LMNN metrics, are then weighted and combined for further analysis. Additionally, rather than using the k-nearest neighbor (k-NN) classification mechanism, we propose a verification mechanism that measures the correlation of the class label distribution of neighbors to reduce the false negative rate of positive pairs. From the experimental results, we see that DML can modify the relation of negative pairs in the original LMNN space and compensate for LMNN's performance on faces with large variances, such as pose and expression.

Intellectual Freedom Issues in Library Collection Development (장서개발에 있어서 지적자유의 문제)

  • Chang, D.H.
    • Journal of Korean Library and Information Science Society
    • /
    • v.42 no.1
    • /
    • pp.165-182
    • /
    • 2011
  • This paper attempts to portray the issues of intellectual freedom that confront librarians in developing collections in libraries. It is observed that the issue has hardly been drawn attention in Korea while, from various cases, concerns about intellectual freedom have been increased in many countries. Situated in this observation, this paper surveys various aspects of endeavors to protect intellectual freedom in information service settings. It is also stressed how such issues as free access to information, freedom to know, information barriers in public sectors, and freedom of expression are addressed in library world. Emphasis was also put on the meaning of intellectual freedom as viewed through some policy documents and guidelines in other countries and its implications.

An Empirical Study on the Influence of Social Network Services(SNS) and Individual Characteristics on Intention to Continuous Use of SNS (소셜 네트워크 서비스의 지속적 사용의도에 영향을 미치는 서비스 및 개인 특성에 대한 실증연구)

  • Kim, Sanghyun;Park, Hyun-Sun
    • Journal of Information Technology Services
    • /
    • v.11 no.3
    • /
    • pp.17-38
    • /
    • 2012
  • Social network service(SNS), provided by social network sites such as Facebook, Twitter and Cyworld is rapidly growing in online business. Furthermore, many companies have growing interests in finding effective ways to use SNSs for their innovations, marketing and advertisement. In fact, firms have recognized the utility value of the SNS for their business. In this aspect, this study attempts to identify key factors influencing the intention to continuous use of SNSs. Based on the UTAUT(the Unified Theory of Acceptance and Usage of Technology)model, this study proposes the research model, including the effects of social network service characteristics(social relationship support, information sharing, image expression) and individual characteristics(self-disclosure, extroversion, familiarity) on performance expectancy as well as the moderating effect of perceived information security among UTAUT variables. The 412T sets of data collected in a survey were tested against the modeling using SEM using SmartPLS. Results indicated that social network service and individual characteristics had significant effect on performance expectancy with exception of self-disclosure. In addition, the moderating effect of perceived information security had significant effect. The results had important implications for firms providing SNSs hoping to develop a successful business model.

RGB-based Personal Virtual Currency Price Information System (RGB 기반 개인용 가상화폐 가격정보 안내 시스템)

  • Park, Se-il;Jang, Jong-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.203-204
    • /
    • 2018
  • In recent years, interest in various virtual currencies has been increasing, starting with bit coin, and investment and trading of virtual currencies are being activated. However, since the price of virtual money is unstable and the rate of change of the price is very large, frequent confirmation of the amount of money is required, so that virtual money investors often have to check the virtual money market. Therefore, in this paper, we expect that it will reduce the wasted time on the exchange by using the price information guidance system that collects the virtual currency price information data and express it in RGB, and only the system user can understand the data expression and support the confidentiality.

  • PDF

Ciphertext policy attribute-based encryption supporting unbounded attribute space from R-LWE

  • Chen, Zehong;Zhang, Peng;Zhang, Fangguo;Huang, Jiwu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2292-2309
    • /
    • 2017
  • Ciphertext policy attribute-based encryption (CP-ABE) is a useful cryptographic technology for guaranteeing data confidentiality but also fine-grained access control. Typically, CP-ABE can be divided into two classes: small universe with polynomial attribute space and large universe with unbounded attribute space. Since the learning with errors over rings (R-LWE) assumption has characteristics of simple algebraic structure and simple calculations, based on R-LWE, we propose a small universe CP-ABE scheme to improve the efficiency of the scheme proposed by Zhang et al. (AsiaCCS 2012). On this basis, to achieve unbounded attribute space and improve the expression of attribute, we propose a large universe CP-ABE scheme with the help of a full-rank differences function. In this scheme, all polynomials in the R-LWE can be used as values of an attribute, and these values do not need to be enumerated at the setup phase. Different trapdoors are used to generate secret keys in the key generation and the security proof. Both proposed schemes are selectively secure in the standard model under R-LWE. Comparison with other schemes demonstrates that our schemes are simpler and more efficient. R-LWE can obtain greater efficiency, and unbounded attribute space means more flexibility, so our research is suitable in practices.

Fuzzy Sensor Algorithm for Measuring Traffic Information (교통량검지를 위한 퍼지 센서 알고리즘)

  • 진현수;김성환
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.8 no.2
    • /
    • pp.134-141
    • /
    • 1998
  • Sometimes we need to acquire symbolic quantity of information instead of physical quantity for the output of any system. For instance we can not control traffic signal accurately through only the number of vehicles. At that case we can produce better output using symbolic quantity of road length and width and vehicle type. But it is very difficult to aggregate symbolic information from the unrelated and mutually conflicted input after calculating linear and related expression. Moreover that will take much time to produce symbolic output by the physical quantity only. In this paper we implemented the ultimate traffic control information by using fuzzy sensor algorithm and compared our results with the conventional traffic controller after studying the necessity of symbolic information in the traffic control.

  • PDF

Automatic Generation of MAEC and STIX Standards for Android Malware Threat Intelligence

  • Park, Jungsoo;Nguyen Vu, Long;Bencivengo, George;Jung, Souhwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.8
    • /
    • pp.3420-3436
    • /
    • 2020
  • Due to the increasing number of malicious software (also known as malware), methods for sharing threat information are being studied by various organizations. The Malware Attribute Enumeration and Characterization (MAEC) format of malware is created by analysts, converted to Structured Threat Information Expression (STIX), and distributed by using Trusted Automated eXchange of Indicator Information (TAXII) protocol. Currently, when sharing malware analysis results, analysts have to manually input them into MAEC. Not many analysis results are shared publicly. In this paper, we propose an automated MAEC conversion technique for sharing analysis results of malicious Android applications. Upon continuous research and study of various static and dynamic analysis techniques of Android Applications, we developed a conversion tool by classifying parts that can be converted automatically through MAEC standard analysis, and parts that can be entered manually by analysts. Also using MAEC-to-STIX conversion, we have discovered that the MAEC file can be converted into STIX. Although other researches have been conducted on automatic conversion techniques of MAEC, they were limited to Windows and Linux only. In further verification of the conversion rate, we confirmed that analysts could improve the efficiency of analysis and establish a faster sharing system to cope with various Android malware using our proposed technique.

An Efficient Method for Transmission of Contour Information in Mobile GIS Environments (모바일 GIS 환경에서 등고선 정보의 효율적인 전송 기법)

  • Choi, Jin-Oh
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.6
    • /
    • pp.1111-1116
    • /
    • 2009
  • For expression of contour lines in mobile GIS environments, the client needs to receive the numerical data with the topographical map from a server. At this point, a client can't get the entire raw data because of the mobile characteristics. The approach to get representative points and to make isogram by interpolation methods, has some problems. The approach requires huge computing overhead at the client and doesn't guarantee the correctness of the isogram. In this paper, a data structure, algorithm and implementation results for efficient transmission of contour information to a client which is constructed from elevation information at a server, are proposed.

Design and Implementation of Efficient Transmission Method of Elevation Information in Mobile GIS Environments (모바일 GIS 환경에서 효율적인 고도 정보의 전송 기법 설계 및 구현)

  • Choi, Jin-Oh
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.151-154
    • /
    • 2008
  • For expression of isogram in mobile GIS environments, the client needs to receive the value data with the topographical map from a server. At this point, a client can't get the entire raw data because of the mobile characteristics. The approach to get representative points and to make isogram by interpolation methods, has some problems. The approach requires huge computing overhead at the client and doesn't guarantee the correctness of the isogram. In this paper, a data structure, algorithm and implementation results for efficient transmission of contour information to a client which is constructed from a elevation information at a server, are proposed.

  • PDF

First-order Generalized Integrator Based Frequency Locked Loop and Synchronization for Three-Phase Grid-connected Converters under Adverse Grid Conditions

  • Luo, Zhaoxu;Su, Mei;Sun, Yao;Liu, Zhangjie;Dong, Mi
    • Journal of Power Electronics
    • /
    • v.16 no.5
    • /
    • pp.1939-1949
    • /
    • 2016
  • This paper presents an alternative frequency adaptive grid synchronization technique named HDN-FLL, which can accurately extract the fundamental positive- and negative-sequence components and interested harmonics in adverse three-phase grid voltage. The HDN-FLL is based on the harmonic decoupling network (HDN) consisting of multiple first order complex vector filters (FOCVF) with a frequency-locked loop (FLL), which makes the system frequency adaptive. The stability of the proposed FLL is strictly verified to be global asymptotically stable. In addition, the linearization and parameters tuning of the FLL is also discussed. The structure of the HDN has been widely used as a prefilter in grid synchronization techniques. However, the stability of the general HDN is seldom discussed. In this paper, the transfer function expression of the general HDN is deduced and its stability is verified by the root locus method. To show the advantages of the HDN-FLL, a simulation comparison with other gird synchronization methods is carried out. Experimental results verify the excellent performance of the proposed synchronization method.